Preferred Language
Articles
/
ijs-6946
A Load Balancing Scheme for a Server Cluster Using History Results
...Show More Authors

Load balancing in computer networks is one of the most subjects that has got researcher's attention in the last decade. Load balancing will lead to reduce processing time and memory usage that are the most two concerns of the network companies in now days, and they are the most two factors that determine if the approach is worthy applicable or not. There are two kinds of load balancing, distributing jobs among other servers before processing starts and stays at that server to the end of the process is called static load balancing, and moving jobs during processing is called dynamic load balancing. In this research, two algorithms are designed and implemented, the History Usage (HU) algorithm that statically balances the load of a Loaded Web Server (LWS) and the Massage Passing Optimization (MPO) algorithm. HU algorithm is used at the Domain Name System (DNS) side is to minimize the time required to execute the client requests based on using history results available in one of the Web servers in the server cluster. The MPO is for optimizing the message passing between the Web servers and the DNS. This message optimization will lead to optimize the processing time in the DNS cluster required to find under-loaded Web servers that will perform the request.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 26 2018
Journal Name
Oriental Journal Of Chemistry
Excess Molar Quantities of Binary Mixture of Dipropyl amine with Aliphatic Alcohols at 298.15 K
...Show More Authors

Refractive indices (nD), viscosities (η) and densities (r) were deliberated for the binary mixtures created by dipropyl amine with 1-octanol, 1-heptanol, 1-hexanol, 1-pentanol and tert-pentyl alcohol at temperature 298.15 K over the perfect installation extent. The function of Redlich-Kister were used to calculate and renovated of the refractive index deviations (∆nD), viscosity deviations (ηE), excess molar Gibbs free energy (∆G*E) and excess molar volumes(Vm E). The standard errors and coefficients were respected by this function. The values of ∆nD, ηE, Vm E and ∆G*E were plotted against mole fraction of dipropyl amine. In all cases the obtained ηE, ∆G*E, Vm E and ∆nD values were negative at 298.15K. Effect of carbon atoms

... Show More
Publication Date
Mon Jun 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Determination of the Elastic and Viscous Behavior of Polycarbonate Melts at Different Temperatures and Their Relationship to the Steady State Viscosity via the Cox-Merz Rule
...Show More Authors

Rheological instrument is one of the basic analytical measurements for diagnosing the properties of polymers fluids to be used in any industry. In this research polycarbonate was chosen because of its importance in many areas and possesses several distinct properties.
Two kinds of rheometers devices were used at different range of temperatures from 220 ˚C-300 ˚C to characterize the rheological technique of melted polycarbonate (Makrolon 2805) by a combination of different investigating techniques. We compared the results of the linear (oscillatory) method with the non-linear (steady-state) method; the former method provided the storage and the loss modulus of melted polycarbonate, and presented the Cox-Merz model as well. One of the

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The use of the genetic algorithm to estimate the parameters function of the hypoexponential distribution by simulation
...Show More Authors

In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 06 2021
Journal Name
Iraqi Journal Of Science
Study the Wet Region in Anbar Province by Use Remote Sensing (RS) and Geographic Information System (GIS) Techniques
...Show More Authors

Recently, in the last years, the world interested with Ecosystem is increased, and
that is interrelation with global atmospherically, by the existence followed
continuous animate variables, that is immediately influence at ecosystem nature by
inspection systems process such as satellite imagery or aerial photographs, that can
determination the wetland regions which aid fulfillment balance globe ecosystem. In
this study a determination of wetland regions in IRAQ, was done for Anbar
province, because many of regions Saturated with water or sponge and aquatic of
plant, additionally, existence metrology factors that significant role were depended
to be as important factor to define the wetland regions as temperatures,

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 06 2019
Journal Name
Ssociation Of Arab Universities Journal Of Engineering Sciences
Application of Artificial Neural Network and GeographicalInformation System Models to Predict and Evaluate the Quality ofDiyala River Water, Iraq
...Show More Authors

This research discusses application Artificial Neural Network (ANN) and Geographical InformationSystem (GIS) models on water quality of Diyala River using Water Quality Index (WQI). Fourteen water parameterswere used for estimating WQI: pH, Temperature, Dissolved Oxygen, Orthophosphate, Nitrate, Calcium, Magnesium,Total Hardness, Sodium, Sulphate, Chloride, Total Dissolved Solids, Electrical Conductivity and Total Alkalinity.These parameters were provided from the Water Resources Ministryfrom seven stations along the river for the period2011 to 2016. The results of WQI analysis revealed that Diyala River is good to poor at the north of Diyala provincewhile it is poor to very polluted at the south of Baghdad City. The selected parameters wer

... Show More
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
An Observation and Analysis the role of Convolutional Neural Network towards Lung Cancer Prediction
...Show More Authors

Lung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-c

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Network Authentication Protocol Based on Secure Biometric NIDN
...Show More Authors

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

View Publication Preview PDF
Scopus Crossref